Sciweavers

10044 search results - page 20 / 2009
» Authentication in Wireless Networks
Sort
View
MOBIHOC
2005
ACM
15 years 9 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
PERCOM
2005
ACM
15 years 9 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
ICNS
2008
IEEE
15 years 3 months ago
Performance Study of PANA Pre-authentication for Interdomain Handover
—To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuo...
Patryk Chamuczynski, Omar Alfandi, Constantin Wern...
COMCOM
2011
14 years 4 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
PERCOM
2008
ACM
15 years 9 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...